Connecting to LinkedIn...

Connecting to LinkedIn...

W1siziisijiwmtqvmdkvmzavmtavndevmzevmzkxl3n0b2nrx3bob3rvx2pvynnfynv0dg9ux29ux2tlewjvyxjkxzgwmdu4mtgxlmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Penetration Tester

Job Title: Penetration Tester
Contract Type: Contract
Location: London, London
Industry:
Salary: £500 - £550 per annum
Start Date: ASAP
Duration: 3 month (ext)
REF: PEN-TEST
Contact Name: Alex Woodrow
Contact Email: alexw@montash.com
Job Published: about 1 year ago

Job Description

Montash are currently recruiting for a Pen Tester for a global organization.

the contract WILL be extended if successful candidate is highly performing.

Pen Tester Role Summary

  • Co-ordinate and execute Cyber Security Technical Assurance activities, including internal / external penetration tests and technical security assessments of VE's applications and systems to a high degree of accuracy and quality.
  • Reviews results of pen testing in order to determine severity of findings and to ensure proper remediation is applied.
  • Pro-actively research and identify vulnerabilities and provide recommended counter measures or mitigating controls to reduce risk to an acceptable and manageable level.
  • Assist with the design, development and recommendation of security solutions to protect client data and systems.
  • Promote compliance with relevant security legislation and generally accepted industry security standards. Interprets security policy and contributes to development of standards and guidelines that comply with this.
  • SME for web, mobile or network penetration testing with track record of end to end testing of complex systems
  • Technical support could include but not limited to the following: (1) Audit support & remediation, (2) Process Improvement, (3) Cross Divisional Functional education, training and awareness,
  • Support senior management in identifying and streamlining new/existing protocols and tools used by the penetration testing team.
  • Develop and automate scripts, tools and resources needed to advance security assurance capabilities around new and emerging technologies like mobile, cloud and embedded systems.
  • Creation of re-usable documentation, artefacts and processes to assist in streamlined delivery of BAU services to projects and Business As Usual (BAU).

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...